I am trying to integrate with jradius client to communicate with Cisco ISE server for EAP-TLS authentication. I ran a sample test and below is the issue I am seeing in ISE logs:
"TLS packet parsing ...

I've learned that SSL certificates can be chained, and the browser will use the issuer's public key to verify the issuer's signature. I have read this article, which has a very helpful diagram, but it ...

We have a mobile app that calls Web Service on our server. We are planning to setup ssl on the server and going to buy a wildcard certificate from network solutions. Wildcard certificate from Network ...

Applications (e.g. Firefox) often include a root ca bundle file containing trusted certificates.
How can I protect those files from malicious agents trying to modify them? I think signing is not an ...

I have a BS/MS in Computer Science and have worked as a developer for 15 years. Currently I have been reading a lot about computer security.
Serverfault and Stackoverflow seem to be the go to place ...

Every Activesync writeup I've seen, by MSFT or 3rd parties seems to encourage the deployment of client certificates with the "require" feature, as opposed to the "Accept/Optional" selection.
I want ...

I am working with a security person that baffles me a bit with the practices he performs. Besides the issue of this person insisting on bypassing every security measure in place we have got into it ...

I'm currently working on my bachelor thesis, and without going to much into detail the main mission is to develop the possibility for sending media (pictures, videos and recordings) from the app on ...

My Girlfriend has a years-old laptop from lenovo. I checked it over and wasn't surprised that the Superfish / Komodia Root CA certificate was not present. However I found some others that appear to ...

I tested their server using https://www.ssllabs.com/ssltest/ and, apart from the disappointing "B" rating (it handles financial transactions, after all), the server only allows the following two RC4 ...

I am using openssl tool to create certificate self-signed certificate
I have known that [2048 bit SSL] it is the length of the public key
then what about [256 bit encryption] how can i know type of ...

The site has already a discussion of the security risks of "Superfish". It seems to me that anything that tampers with the bits of one's connection is bad. If it tampers with TLS connections, it is ...

So I am trying to figure out what the packet payload is off of a possible TLS HeartBleed alert from my IDS. I have read that Wireshark is able to do it with some certain keys, but isn't that in real ...

I want to secure my root server (further) service by service, starting with the SMTP service (Postfix MTA) as the most busy one. I the course of setting everything up, I read a lot about security and ...

I'd like to have my server APIs only accept requests from my own app, to prevent other "rogue" clients of my service.
As i understand it, the way to do this would be with a "client certificate" that ...

I have the following use case:
I want to write a desktop application that makes use of a third-party API (e.g. Dropbox)
This API requires an access_token to be sent to the server with each request.
...

Let's say that I'm on a university (or company) network that requires you to install a root certificate to connect to their website. Now let's say that you trust these people but not anybody else. Is ...

I have Windows 2008 R2 servers which are failing a PCI vulnerability scan because they have RDP enabled (needs to be disabled).
I have applied the PCI settings of IISCrypto tool, but I have to leave ...